/system/keymaster/ |
D | kdf_test.cpp | 32 ForTestAbstractKdf kdf; in TEST() local 35 ASSERT_TRUE(kdf.Init(KM_DIGEST_SHA1, key, 128, salt, 128)); in TEST() 36 ASSERT_TRUE(kdf.Init(KM_DIGEST_SHA_2_256, key, 128, salt, 128)); in TEST() 37 ASSERT_TRUE(kdf.Init(KM_DIGEST_SHA1, key, 128, nullptr, 0)); in TEST() 38 ASSERT_FALSE(kdf.Init(KM_DIGEST_MD5, key, 128, salt, 128)); in TEST() 39 ASSERT_FALSE(kdf.Init(KM_DIGEST_SHA1, nullptr, 0, salt, 128)); in TEST() 40 ASSERT_FALSE(kdf.Init(KM_DIGEST_SHA1, nullptr, 128, salt, 128)); in TEST() 41 ASSERT_FALSE(kdf.Init(KM_DIGEST_SHA1, key, 0, salt, 128)); in TEST()
|
D | ecies_kem.cpp | 45 keymaster_kdf_t kdf; in EciesKem() local 46 if (!authorizations.GetTagValue(TAG_KDF, &kdf)) { in EciesKem() 51 switch (kdf) { in EciesKem() 56 LOG_E("Kdf %d is unsupported", kdf); in EciesKem()
|
D | Makefile | 96 kdf.cpp \ 220 kdf.o \ 228 kdf.o \ 238 kdf.o \ 249 kdf.o \ 273 kdf.o \
|
D | attestation_record.cpp | 67 ASN1_INTEGER_SET* kdf; member 102 ASN1_EXP_SET_OF_OPT(KM_AUTH_LIST, kdf, ASN1_INTEGER, TAG_KDF.masked_tag()), 296 integer_set = &record->kdf; in build_auth_list()
|
D | Android.bp | 139 "kdf.cpp",
|
/system/vold/ |
D | cryptfs.cpp | 1162 kdf_func kdf, void *kdf_params, in decrypt_master_key_aux() argument 1172 if (kdf(passwd, salt, ikey, kdf_params)) { in decrypt_master_key_aux() 1210 static void get_kdf_func(struct crypt_mnt_ftr *ftr, kdf_func *kdf, void** kdf_params) in get_kdf_func() argument 1213 *kdf = scrypt_keymaster; in get_kdf_func() 1216 *kdf = scrypt; in get_kdf_func() 1219 *kdf = pbkdf2; in get_kdf_func() 1229 kdf_func kdf; in decrypt_master_key() local 1233 get_kdf_func(crypt_ftr, &kdf, &kdf_params); in decrypt_master_key() 1235 decrypted_master_key, kdf, kdf_params, in decrypt_master_key()
|
/system/tpm/trunks/ |
D | tpm_utility_impl.cc | 1701 public_area.parameters.ecc_detail.kdf.scheme = TPM_ALG_NULL; in CreateDefaultPublicArea()
|
D | tpm_generated.h | 1317 TPMI_ALG_KDF kdf; member 1447 TPMT_KDF_SCHEME kdf; member 1522 TPMT_KDF_SCHEME kdf; member
|
D | tpm_generated.cc | 5158 result = Serialize_TPMI_ALG_KDF(value.kdf, buffer); in Serialize_TPMS_SCHEME_XOR() 5176 result = Parse_TPMI_ALG_KDF(buffer, &value->kdf, value_bytes); in Parse_TPMS_SCHEME_XOR() 6301 result = Serialize_TPMT_KDF_SCHEME(value.kdf, buffer); in Serialize_TPMS_ALGORITHM_DETAIL_ECC() 6364 result = Parse_TPMT_KDF_SCHEME(buffer, &value->kdf, value_bytes); in Parse_TPMS_ALGORITHM_DETAIL_ECC() 6880 result = Serialize_TPMT_KDF_SCHEME(value.kdf, buffer); in Serialize_TPMS_ECC_PARMS() 6908 result = Parse_TPMT_KDF_SCHEME(buffer, &value->kdf, value_bytes); in Parse_TPMS_ECC_PARMS()
|
/system/tpm/trunks/generator/ |
D | raw_structures.txt | 12951 kdf 13976 kdf 14719 kdf 14725 If the kdf
|
D | raw_structures_fixed.txt | 12963 kdf 13991 kdf 14712 kdf
|
D | raw_commands_fixed.txt | 4249 6) If the key is an ECC key and the KDF required by the curveID is not the same as kdf in the pubic 4255 requires that the kdf in the template be set to TPM_ALG_NULL or TPM_RC_KDF is
|
D | raw_commands.txt | 4247 6) If the key is an ECC key and the KDF required by the curveID is not the same as kdf in the pubic 4253 requires that the kdf in the template be set to TPM_ALG_NULL or TPM_RC_KDF is
|